Company and Product News Coverage
Learn how to achieve a seamless user experience with SAML single sign-on (SSO) and Forum Sentry. In this video tutorial we will walk you through a detailed explanation and demonstration of the how SAML SSO works, two common SAML SSO use cases, and the important role of security when implementing SSO.
A couple of years ago if you asked Americans about cloud computing, half would tell you that stormy weather could interfere with cloud computing. Despite not understanding what cloud computing was, 97 percent were using some form of it and a third were already concerned about both security and privacy based on what they had read or heard in the media.
Within SAML, there are profiles that define how assertions, protocols and bindings are combined to satisfy a particular use case. Think of a SAML profile as a template, each profile uses different combination of bindings, protocols and assertions. One of the most used SAML profiles is the Web Browser SSO Profile.
Last month, Forum Systems'API Security Gateway, Forum Sentry, was featured inNewtork World's products of the week!Recently, Forum Systems has enhanced theirAPI Security Gatewaywith new features that include: intelligent edge caching, Amazon S3 integration and expanded OAuth 2.0 support.The new intelligent edge caching will help enterprises optimize their network resources and ultimately reduce their overall infrastructure costs by minimizing latency. Amazon S3 integration allows organizati [...]
Navigating SOA appliances: How to choose the right oneCorporations are increasingly driven to open up their internal systems to external and internal users.With an accelerated adoption of mobile computing, employees require access to enterprise applications from both within and outside the corporate boundaries.Corporations are only willing to provide such access with strong security provisions in place.Crystal Bedell's recent article highlights the drivers for a SOA Appliance:S [...]
Prepare for a host of new networking problems as devices never meant to be computers become network connected, reports Deb Radcliff.http://www.scmagazine.com/exotic-new-connections-embedded-devices/article/236308/3/Phones, vehicles, traffic lights, medical devices, buildings, even weapons – everything's getting plugged in these days. This connectivity might make sense from a management and efficiency perspective. However, these devices – often chip-enabled and communicating over [...]
Service Technology Magazine recently published an article on the merits of centralized SOA security.Here's the abstract:Abstract: This article compares centralized and decentralized application security models. It focuses on technical costs and organizational considerations while comparing these models. The analysis shows that centralized management of security policies has significant advantages over decentralized application security deployments including cost reduction, better risk miti [...]
James Denmanwrote an interesting piece titledXML security applianceshopping advice where he talks about real-life challenges faced by customers and their use of XML appliances such asForum Sentryto solve such problems.Earlier this month I wrote an article on a Software as a Service provider that employed a SOA security appliance for authentication and identity federation. OmegaFi, the SaaS provider in question, fills an interesting niche – providing financial services for Greek fraternities an [...]